Try our new research platform with insights from 80,000+ expert users

Netwrix Usercube vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Netwrix Usercube
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
39th
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
No ranking in other categories
Tenable Cloud Security
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
12th
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Container Security (24th), Cloud Workload Protection Platforms (CWPP) (11th), Cloud Security Posture Management (CSPM) (17th), Cloud-Native Application Protection Platforms (CNAPP) (13th), Cloud Infrastructure Entitlement Management (CIEM) (4th)
 

Mindshare comparison

As of October 2025, in the Identity and Access Management as a Service (IDaaS) (IAMaaS) category, the mindshare of Netwrix Usercube is 0.5%, up from 0.1% compared to the previous year. The mindshare of Tenable Cloud Security is 0.8%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity and Access Management as a Service (IDaaS) (IAMaaS) Market Share Distribution
ProductMarket Share (%)
Tenable Cloud Security0.8%
Netwrix Usercube0.5%
Other98.7%
Identity and Access Management as a Service (IDaaS) (IAMaaS)
 

Featured Reviews

Use Netwrix Usercube?
Share your opinion
DragosCernat - PeerSpot reviewer
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
report
Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
869,566 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
13%
Government
11%
Financial Services Firm
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
I think Tenable Cloud Security could be improved with more clear licensing. What I would like to see improved with licensing is how they're used in the product. The calculations of what is consider...
What is your primary use case for Tenable Cloud Security?
My main use case for Tenable Cloud Security is managing our security compliance and security posture. I use Tenable Cloud Security for managing compliance and security posture, and we rely on the c...
 

Also Known As

No data available
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Information Not Available
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about Microsoft, SailPoint, Okta and others in Identity and Access Management as a Service (IDaaS) (IAMaaS). Updated: September 2025.
869,566 professionals have used our research since 2012.